Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 726/1
Name: Information security > Policy
Description: Subject matter comprising systems, methods, and apparatus that provide for the administration and management of rules or regulations governing the protection of information, services and other data processing resources involving coordination of more than one security mechanisms among a plurality of entities, resources, or processes.

Patents under this class:

Patent Number Title Of Patent Date Issued
8683553 System, method, and computer program products for enabling trusted access to information in a diverse service environment Mar. 25, 2014
8683551 Peer-to-peer network Mar. 25, 2014
8683550 System and method for validating a user of an account using a wireless device Mar. 25, 2014
8683548 Computing with policy engine for multiple virtual machines Mar. 25, 2014
8683547 System and method for implementing adaptive security zones Mar. 25, 2014
8683546 Managing security configuration through machine learning, combinatorial optimization and attack graphs Mar. 25, 2014
8683545 Federating policies from multiple policy providers Mar. 25, 2014
8683544 System and method for providing access to a network using flexible session rights Mar. 25, 2014
8683191 Reconfiguring a secure system Mar. 25, 2014
8683037 Background task execution over a network Mar. 25, 2014
8681984 Context-aware based RFID privacy control system and personal privacy protection method using the same Mar. 25, 2014
8677499 Enforcing access control policies on servers in an information management system Mar. 18, 2014
8677471 Port allocation in a firewall cluster Mar. 18, 2014
8677458 Hierarchical structure of a notification system including rights based on roles Mar. 18, 2014
8677453 Highly parallel evaluation of XACML policies Mar. 18, 2014
8677450 Systems and methods of controlling network access Mar. 18, 2014
8677449 Exposing data to virtual machines Mar. 18, 2014
8677448 Graphical user interface including usage trending for sensitive files Mar. 18, 2014
8677447 Identifying user names and enforcing policies Mar. 18, 2014
8677446 Centrally managed impersonation Mar. 18, 2014
8677445 Information processing apparatus and computer readable medium Mar. 18, 2014
8677007 Systems and methods for bypassing an appliance Mar. 18, 2014
8676916 Method and apparatus for connection to virtual private networks for secure transactions Mar. 18, 2014
8676714 Hardware specific product license validation Mar. 18, 2014
8676198 Method of supporting location privacy Mar. 18, 2014
8676187 Dynamic binding of service on bearer Mar. 18, 2014
8671461 System, apparatus, and media for granting access to and utilizing content Mar. 11, 2014
8671448 Method and system for implementing mandatory file access control in native discretionary access control environments Mar. 11, 2014
8671447 Net-based email filtering Mar. 11, 2014
8671438 Method and system for managing security of mobile terminal Mar. 11, 2014
8671087 System, method and computer program product for scanning and indexing data for different purposes Mar. 11, 2014
8667598 Reproduction rule evaluation device, reproduction rule evaluation method, recording medium and program Mar. 4, 2014
8667559 Feature management of a communication device Mar. 4, 2014
8667558 Application identity design Mar. 4, 2014
8667557 Independent role based authorization in boundary interface elements Mar. 4, 2014
8667556 Method and apparatus for building and managing policies Mar. 4, 2014
8667555 Integrity plug-in-proxy Mar. 4, 2014
8667306 Automatic security action invocation for mobile communications device Mar. 4, 2014
8666906 Discrete verification of payment information Mar. 4, 2014
8666408 Method of supporting location privacy Mar. 4, 2014
8661534 Security system with compliance checking and remediation Feb. 25, 2014
8661525 Implementation method and system of virtual private network Feb. 25, 2014
8661523 Mass storage lockout for USB devices on extended USB system Feb. 25, 2014
8661505 Policy evaluation in controlled environment Feb. 25, 2014
8661504 Secure social web orchestration via a security model Feb. 25, 2014
8661503 Flexible document security for procurement agents Feb. 25, 2014
8661502 Determining a sensitivity label of document information in real time Feb. 25, 2014
8661501 Integrated guidance and validation policy based zoning mechanism Feb. 25, 2014
8661500 Method and apparatus for providing end-to-end privacy for distributed computations Feb. 25, 2014
8661499 Dynamic policy trees for matching policies Feb. 25, 2014

  Recently Added Patents
Mineral, nutritional, cosmetic, pharmaceutical, and agricultural compositions and methods for producing the same
Method for producing lactamates by way of thin film evaporation
Radio frequency power delivery system
System and method for controlling device location determination
System and method to assess and report the health of landing gear related components
Monitoring heap in real-time by a mobile agent to assess performance of virtual machine
Image display device and method of changing first EDID with second EDID wherein the second EDID information is compatible with image display device
  Randomly Featured Patents
Matrix type piezoelectric/electrostrictive device and manufacturing method thereof
Color sensing device
Methods, systems and computer program products for chaining integration objects to provide web access for legacy data sources
Combined string reel and light bulb storage compartment
Method for use of preflux, printed wiring board, and method for production thereof
Method and apparatus for independent and simultaneous access to a common data set
Optical unit for use in laser beam printer or the like
Combined vehicle hood shield and windshield deflector
Planar type mirror galvanometer incorpotating a displacement detection function
Method of preparing storage phosphors from dedicated precursors